Sciweavers

345 search results - page 42 / 69
» Effective memory protection using dynamic tainting
Sort
View
71
Voted
GECCO
2008
Springer
144views Optimization» more  GECCO 2008»
14 years 10 months ago
Multi-resistant radar jamming using genetic algorithms
The next generation of advanced self-protection jammers is expected to deliver effective and energy efficient jamming against modern air tracking radars. However, optimizing such ...
Hans Jonas Fossum Moen, Stein Kristoffersen
ICPP
2003
IEEE
15 years 3 months ago
Procedural Level Address Offset Assignment of DSP Applications with Loops
Automatic optimization of address offset assignment for DSP applications, which reduces the number of address arithmetic instructions to meet the tight memory size restrictions an...
Youtao Zhang, Jun Yang 0002
95
Voted
SEMWEB
2009
Springer
15 years 4 months ago
Anchor-Flood: Results for OAEI 2009
Our ontology schema matching algorithm takes the essence of the locality of reference by considering the neighboring concepts and relations to align the entities of ontologies. It ...
Md. Seddiqui Hanif, Masaki Aono
IOLTS
2005
IEEE
163views Hardware» more  IOLTS 2005»
15 years 3 months ago
Modeling Soft-Error Susceptibility for IP Blocks
As device geometries continue to shrink, single event upsets are becoming of concern to a wider spectrum of system designers. These “soft errors” can be a nuisance or catastro...
Robert C. Aitken, Betina Hold
75
Voted
VLDB
2004
ACM
147views Database» more  VLDB 2004»
15 years 3 months ago
Client-Based Access Control Management for XML documents
The erosion of trust put in traditional database servers and in Database Service Providers, the growing interest for different forms of data dissemination and the concern for prot...
Luc Bouganim, François Dang Ngoc, Philippe ...